139.8 KB | 3 files | DOC, PDF
Use this template to establish a control mechanism for official use of IM, create guidelines for employee use and describe expectations for business unit oversight of IM usage, among other things.
There are many security threats associated with instant messaging (IM) in the enterprise that increase a company's vulnerability. Use this template to establish a policy that will:
Rein in IM security risks in by downloading and tailoring this IM security policy.
The attached Zip file includes:
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle. ... More >>
This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys. ... More >>
In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay out of trouble, and maximize their utility in your business. ... More >>